P2P Network Structure Graph Finding for P2P Botnet Detection

被引:0
|
作者
Yuan, Zhi-chao [1 ]
Li, Yuan-long [1 ]
Yao, Shan [2 ]
Xia, Chun-he [1 ]
机构
[1] Beihang Univ, Beijing Key Lab Network Technol, Beijing 100191, Peoples R China
[2] Coordinat Ctr China, Natl Comp Network Emergency Response Tech Team, Beijing 100029, Peoples R China
关键词
Network security; P2P botnet; Detection;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Botnets are exploited by most experienced network attackers in nowadays. P2P botnets use P2P protocol as the communication protocol of command and control mechanisms. Many researchers study how to detect P2P botnet in the network. Most methods are based on network traffic analysis, but they're not suitable for encrypting traffic. In this paper, we focus on the method of P2P network structure graph finding for P2P botnet detection. The detection algorithm is given to construct the structure of the network and detecting the P2P botnet. We demonstrate the validity of this method with an experimental simulation at last.
引用
收藏
页码:697 / 701
页数:5
相关论文
共 50 条
  • [1] P2P Botnet Detection Method Based on Graph Neural Network
    Lin H.
    Zhang Y.
    Guo N.
    Chen L.
    [J]. Gongcheng Kexue Yu Jishu/Advanced Engineering Sciences, 2022, 54 (02): : 65 - 72
  • [2] Experiments with P2P Botnet Detection
    Riviere, Lionel
    Dietrich, Sven
    [J]. IT-INFORMATION TECHNOLOGY, 2012, 54 (02): : 90 - 95
  • [3] An Efficient Botnet Detection System for P2P Botnet
    Thangapandiyan, M.
    Anand, P. M. Rubesh
    [J]. PROCEEDINGS OF THE 2016 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, SIGNAL PROCESSING AND NETWORKING (WISPNET), 2016, : 1217 - 1221
  • [4] Botnet and P2P Botnet Detection Strategies: A Review
    Dhayal, Himanshi
    Kumar, Jitender
    [J]. PROCEEDINGS OF THE 2018 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATION AND SIGNAL PROCESSING (ICCSP), 2018, : 1077 - 1082
  • [5] P2P and P2P botnet traffic classification in two stages
    Ye, Wujian
    Cho, Kyungsan
    [J]. SOFT COMPUTING, 2017, 21 (05) : 1315 - 1326
  • [6] P2P and P2P botnet traffic classification in two stages
    Wujian Ye
    Kyungsan Cho
    [J]. Soft Computing, 2017, 21 : 1315 - 1326
  • [7] On the resilience of P2P botnet footprints in the presence of legitimate P2P traffic
    Daneshgar, Fateme Faraji
    Abbaspour, Maghsoud
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2019, 32 (13)
  • [8] Research on P2P Botnet Network Behaviors and Modeling
    Li, Huabo
    Hu, Guyu
    Yang, Yun
    [J]. INFORMATION COMPUTING AND APPLICATIONS, PT 1, 2012, 307 : 82 - 89
  • [9] Adaptive traffic sampling for P2P botnet detection
    He, Jie
    Yang, Yuexiang
    Wang, Xiaolei
    Tan, Zhiguo
    [J]. INTERNATIONAL JOURNAL OF NETWORK MANAGEMENT, 2017, 27 (05)
  • [10] Detecting P2P Traffic from the P2P Flow Graph
    Kim, Jonghyun
    Shah, Khushboo
    Bohacek, Stephan
    [J]. 2011 7TH INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING CONFERENCE (IWCMC), 2011, : 1795 - 1800